Puzzles for Hackers


Book Description

These puzzles and mind-benders serve as a way to train logic and help developers, hackers, and system administrators discover unconventional solutions to common IT problems. Users will learn to find bugs in source code, write exploits, and solve nonstandard coding tasks and hacker puzzles. Cryptographic puzzles, puzzles for Linux and Windows hackers, coding puzzles, and puzzles for web designers are included.




Hacker's Challenge 2: Test Your Network Security & Forensic Skills


Book Description

For readers who want to keep the bad guys out of their network, the latest edition of this bestselling book features over 20 all-new hacking challenges to solve. Plus, the book includes in-depth solutions for each, all written by experienced security consultants.




Hackish C++ Games & Demos


Book Description

This guide to maximizing visual effects and optimizing graphics for game programming with C++ and DirectX is a practical introduction to the latest C++ technologies and techniques. The new concept of demo coding—a program whose purpose is to present the technical and artistic skills of programmers—is provided, as is help for programmers demonstrating their new skills in creating 2-D and 3-D games and demo scenes. An accompanying CD-ROM includes demo scenes, game-development projects, and examples from the book.




Hacker's Delight


Book Description

Compiles programming hacks intended to help computer programmers build more efficient software, in an updated edition that covers cyclic redundancy checking and new algorithms and that includes exercises with answers.




Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits


Book Description

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoors, exploits (locals and remotes), scanners (CGI and port), smurf and fraggle attacks, and brute-force attacks. In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format-string errors and other less common errors, this guide includes the source code of all the described utilities on the accompanying CD-ROM.




Hackers Adult Coloring Book


Book Description

In computing, a hacker is any highly skilled computer expert that uses their technical knowledge to overcome a problem. While "hacker" can refer to any computer programmer, the term has become associated in popular culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to break into computer systems.




The Everything Logic Puzzles Book Volume 1


Book Description

This brand-new puzzle book features 200 logic questions of varying types and difficulty. Mental workout warriors and logic lovers will adore The Everything Book of Logic Puzzles Volume I. You’ll learn ten different kinds of puzzles and how to solve each, with the difficulty slowly increasing from basic to expert as you go along. And every single puzzle is specifically designed to improve memory, vocabulary, and logical reasoning. With increasingly difficult puzzles ranging from introductory to fiendish, and comprehensive answers to explain each puzzle, this book is perfect for puzzlers of all ages and skill levels!




Professional Computer Hackers


Book Description

Information is one of the biggest businesses in the world today, even among criminals. People called hackers have been around for decades. They break into computer systems to steal private information. They then use it for their own financial gain. Other people also make their living by hacking. But they do it legally. Professional computer hackers use their skills to keep others from becoming the victims of criminal hackers. Part of the series, They Do That for a Living?, Professional Computer Hackers explores the history of this unusual career, what it takes to join it, and where professional hacking is headed in the future.




Low Tech Hacking


Book Description

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement. - Contains insider knowledge of what could be your most likely Low Tech threat - Includes timely advice from some of the top security minds in the world - Covers many detailed countermeasures that you can employ to improve your security posture




The Birthday of Hacking


Book Description

"The birthday of hacking" is an Information Security book written by Sfraye Tilaye Teshome. This book teaches you about all kinds of things on how a hacker does things. Moreover, It teaches you about tools that hackers use to compromise computer systems. Additionally, "The birthday of hacking" introduces you to how to hack a system and play with it on a virtual machine. In short, This book contains all kinds of information that you can use in real-life situations, whether it is for fun or trying to learn new things.




Recent Books